Tuesday, July 19, 2022
HomeComputer HardwareDevilish SATAn Hack Turns Drive Cable Into Antenna to Steal Information

Devilish SATAn Hack Turns Drive Cable Into Antenna to Steal Information


Hack

(Picture credit score: Ben-Gurion College of the Negev, Israel)

Researchers at the moment revealed a brand new ‘SATAn’ assault that may flip a SATA cable right into a radio transmitter, thus permitting a hacker to exfiltrate information from a system that is not related to a community and transmit it to a receiver 1m away — all with out bodily modifying the SATA cable or {hardware}. The software-based method can work from person area or by means of a digital machine (VM), and you may see a brief demo within the embedded video beneath.

The ever-present SATA connection is utilized in billions of gadgets worldwide to attach onerous drives and SSDs inside a PC, making it the proper goal for hackers searching for a classy assault with a large footprint.

A few of the most delicate information on the planet is saved in air-gapped techniques. These techniques are totally remoted from any connection to the skin world, like a community or the web, and likewise haven’t any {hardware} that may talk wirelessly, like wi-fi Bluetooth or Wi-Fi {hardware}. As such, it requires ultra-sophisticated methods to steal information from them. Researcher Mordechai Guri on the College of the Negev, Israel, has completed the feat by changing a normal SATA cable right into a radio transmitter, however with out truly making any bodily modifications to the {hardware}.  

As with all pc interfaces, the SATA bus generates electromagnetic interference throughout regular operation, and if used appropriately, that interference may be manipulated after which used to transmit information. On this case, the researcher used the SATA cable as a wi-fi antenna that operated on the 6 GHz frequency band, thus transmitting a brief message to the close by laptop computer. This assault can be utilized in live performance with keyloggers to steal passwords or different delicate information. Likewise, attackers can make use of different mechanisms to steal vital information, like recordsdata and pictures.

Naturally, the attacker would first have to put in malicious software program onto the focused machine, however as we have seen with Stuxnet and different assaults, USB gadgets with malicious code can unfold malware inside protected techniques. In any other case, the attacker would wish bodily entry to put in the assault payload.

As soon as put in, the malicious software program first encodes the info to be stolen. Then it conducts sure sorts of file system entry, like reads and writes, in a managed method to generate a sign on the cable. Whereas both learn or write operations can successfully create the proper indicators, the researcher notes that learn operations usually do not require larger permissions on the system degree and generate stronger indicators (as much as 3 dB) than write operations. The researchers additionally famous that background operations that incur different visitors to the storage machine are usually high-quality. Nonetheless, intense drive exercise can muddy the transmissions, so it is best to pause or cease the transmission when heavy background actions happen.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments